CN114666140A - Method, device, computer equipment and medium for accessing form - Google Patents

Method, device, computer equipment and medium for accessing form Download PDF

Info

Publication number
CN114666140A
CN114666140A CN202210302410.6A CN202210302410A CN114666140A CN 114666140 A CN114666140 A CN 114666140A CN 202210302410 A CN202210302410 A CN 202210302410A CN 114666140 A CN114666140 A CN 114666140A
Authority
CN
China
Prior art keywords
sharing
address
party
shared
accessing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210302410.6A
Other languages
Chinese (zh)
Other versions
CN114666140B (en
Inventor
覃海荣
魏向阳
蒋雄斌
刘镇豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Software China Co Ltd
Original Assignee
Kingdee Software China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Software China Co Ltd filed Critical Kingdee Software China Co Ltd
Priority to CN202210302410.6A priority Critical patent/CN114666140B/en
Publication of CN114666140A publication Critical patent/CN114666140A/en
Application granted granted Critical
Publication of CN114666140B publication Critical patent/CN114666140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • G06F16/972Access to data in other repository systems, e.g. legacy data or dynamic Web page generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application discloses a method, a device, computer equipment and a medium for accessing forms, which are applied to a server and a shared party and relate to the field of information security. The shared party obtains the form through the access address, and the server responds to the access request of the shared party and obtains the sharing identification carried by the address; if the sharing identifier is successfully acquired, acquiring corresponding form content according to the sharing identifier and the address, and returning the form content to the shared party, wherein the shared party can check the form content; and if the address does not carry the corresponding sharing identifier, not returning the form content. The shared party can view the form content only by accessing the address with the correct sharing identifier, and the form content can be prevented from being leaked, so that a hacker simulates the form content to cause the shared party to obtain wrong form content, and further more serious results are caused. Therefore, the method provided by the application can improve the safety when the form is accessed, and is particularly suitable for the service scene of accessing the form in an anonymous mode.

Description

Method, device, computer equipment and medium for accessing form
Technical Field
The present application relates to the field of information security, and in particular, to a method, an apparatus, a computer device, and a medium for accessing a form.
Background
At present, anonymous access to a shared form link (URL, uniform resource locator) can be realized, and a general sharing party can directly display the content of a form by directly sending the form to a shared party, for example, a user a shares a current form to a user B, a user C, and the like, and the user B or the user C can access all the content of the form without logging in.
However, if the form is accessed in this way, the security problem is an important problem of sharing anonymous access of the URL form, and the form data is easily simulated by hackers, attacked or viewed without right, so that the shared party cannot obtain correct form content, and the data of the form is leaked, thereby causing economic loss and serious consequences.
Therefore, how to improve the security when accessing the form is an urgent problem to be solved by those skilled in the art.
Disclosure of Invention
The application aims to provide a method, a device and a medium for accessing forms, so that the safety in the process of accessing the forms is improved, and the forms are prevented from being leaked or changed.
In order to solve the above technical problem, the present application provides a method for accessing a form, which is applied to a server, and includes:
responding to an access address of a shared party, and acquiring a sharing identifier carried by the address;
if the sharing identification is successfully acquired, acquiring corresponding form content according to the sharing identification and the address;
and returning the form content.
Optionally, the generating process of the address specifically includes:
receiving a sharing request aiming at the form sent by a sharing party;
generating the sharing identification corresponding to the form according to the sharing request;
and returning the address which corresponds to the form and is provided with the sharing identifier to the sharing party so that the sharing party can conveniently send the address to the shared party.
Optionally, the generating the sharing identifier corresponding to the form according to the sharing request includes:
generating the sharing identification corresponding to the first authority of the sharing party according to the sharing party sending the sharing request;
the returning the form content comprises:
and returning the form content in the first permission corresponding to the sharing identification carried by the address.
Optionally, after the returning of the form content, the method further includes:
if the shared party continues to execute the operation instruction on the form, verifying a random code sent by the shared party, wherein the random code is sent to the server when the shared party executes the operation instruction;
and if the random code is correct, returning the execution result of the operation instruction.
Optionally, the returning the form content includes:
generating the random code corresponding to the shared party;
and returning the form content carrying the random code.
Optionally, the operation instruction is specifically to view a sub-form of the current form;
before returning the execution result of the operation instruction, the method further includes:
and setting the sub-form to be in a read-only state.
Optionally, after obtaining the sharing identifier carried by the address, the method further includes:
any one of the following processes is performed:
acquiring a timestamp of the sharing identifier;
detecting the number of the shared parties with the sharing identification;
detecting the number of times of use of the sharing identification;
the method further comprises the following steps:
if the sharing identification meets a preset condition, removing the corresponding relation between the current sharing identification and the form;
the preset condition comprises at least one of the following conditions:
the timestamp represents that the sharing identifier exceeds a first preset time from generation to the current time;
the number exceeds a preset number;
the number of uses exceeds a preset number.
Optionally, after the form content is returned, the method further includes:
and if the form content currently accessed by the shared party is not the form content corresponding to the sharing identifier, removing the corresponding relation between the current sharing identifier and the form.
Optionally, after obtaining the sharing identifier carried by the address, the method further includes:
acquiring a second authority of the shared party, wherein the second authority is preset by the sharing party on a server;
the returning the form content comprises:
and returning the form content corresponding to the second authority.
In order to solve the above technical problem, the present application further provides a method for accessing a form, where the method is applied to a shared party, and includes:
the address is accessed, so that the server responds to the access of the shared party to obtain the sharing identification carried by the address, and after the sharing identification is successfully obtained, the corresponding form content is obtained according to the sharing identification and the address;
and receiving the form content returned by the server.
In order to solve the above technical problem, the present application further provides an apparatus for accessing a form, which is applied to a server, and includes:
the first acquisition module is used for responding to an access address of a shared party and acquiring a sharing identifier carried by the address;
the second obtaining module is used for obtaining corresponding form content according to the sharing identifier and the address if the sharing identifier is successfully obtained;
and the return module is used for returning the form content.
In order to solve the above technical problem, the present application further provides a computer device, including: a memory for storing a computer program;
and the processor is used for realizing the steps of the form accessing method when executing the computer program.
To solve the above technical problem, the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the above method for accessing a form.
To solve the above technical problem, the present application further provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the method for monitoring page crash as described in any one of the above.
According to the form access method, the shared party obtains the form through the access address. The server responds to an access request of a shared party and acquires a sharing identifier carried by an address; if the sharing identifier is successfully acquired, acquiring corresponding form content according to the sharing identifier and the address, and returning the form content to the shared party, wherein the shared party can check the form content; if the address does not carry the corresponding sharing identifier, the form content is not returned, so that the shared party can view the form content only by accessing the address with the correct sharing identifier, and the form content leakage can be avoided, so that a hacker can simulate the form content to cause the shared party to obtain wrong form content, and further more serious results are caused. Therefore, the method provided by the application can improve the safety when the form is accessed, and is particularly suitable for a service scene of accessing the form in an anonymous mode.
The application also provides a device, computer equipment and a medium for accessing the form, which correspond to the method, so that the method has the same beneficial effects as the method.
Drawings
In order to more clearly illustrate the embodiments of the present application, the drawings needed for the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
Fig. 1 is a flowchart of a method for accessing a form, which is applied to a server according to an embodiment of the present application;
fig. 2 is a flowchart of a method for a shared party to access an address according to an embodiment of the present disclosure;
fig. 3 is a flowchart of a method for sharing an address by a sharing party according to an embodiment of the present disclosure;
fig. 4 is a flowchart of a method applied to an access form of a shared party according to an embodiment of the present disclosure;
FIG. 5 is a block diagram of an apparatus for accessing a form, applied to a server according to an embodiment of the present disclosure;
fig. 6 is a structural diagram of an apparatus for accessing a form, which is applied to a shared party according to an embodiment of the present disclosure;
fig. 7 is a block diagram of a computer device according to another embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without any creative effort belong to the protection scope of the present application.
The core of the application is to provide a method, a device, computer equipment and a medium for accessing forms.
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings.
When a shared party views a form, content corresponding to the form can be viewed by accessing a corresponding address, a server can respond to an access action of the shared party and return the form content to the shared party, fig. 1 is a flowchart of a method applied to the server for accessing the form, the shared party and the shared party can be terminals, the terminals can include but are not limited to various personal computers, notebook computers, smart phones, tablet computers, internet of things equipment and portable wearable equipment, and the internet of things equipment can be smart speakers, smart televisions, smart air conditioners, smart vehicle-mounted equipment and the like. The portable wearable device can be a smart watch, a smart bracelet, a head-mounted device, and the like. The server may be implemented as a stand-alone server or as a server cluster consisting of a plurality of servers. As shown in fig. 1, the method comprises the steps of:
s10: responding to the access address of the shared party, and acquiring the sharing identification carried by the address.
Fig. 2 is a flowchart of a method for a shared party to access an address according to an embodiment of the present disclosure, and as shown in fig. 2, the method includes the following steps: s20: an address with a shared identification is accessed. S21: form content is returned. It should be noted that how the address is generated is not limited, in general, the sharing party sends a sharing request corresponding to the form to the server, and after receiving the sharing request of the sharing party, the server generates a corresponding address and a sharing identifier, and then returns the address carrying the sharing identifier to the sharing party. The sharing party returns an address to the shared server of the shared party, and the shared party generally accesses the address through a browser. When the shared party accesses the address, the server receives an access request of the shared party, the access request comprises the address and a sharing identifier carried by the address, and the server acquires the sharing identifier carried by the address.
S11: and if the sharing identification is successfully acquired, acquiring the corresponding form content according to the sharing identification and the address.
S12: form content is returned.
After the shared party accesses the address with the sharing identifier, the server acquires the address and the related information of the address, such as the sharing identifier, and if the address does not have the sharing identifier, the server does not return the corresponding form to the shared party. If the address carries the sharing identifier, the process of the shared party accessing the form may be as follows: after the shared party accesses the address of the form through the browser, the server returns script content corresponding to the form and a text file (temporary cookie) stored with a sharing identifier to the browser; then, the browser acquires language information used by the current page of the form from a server, and the server detects a sharing identifier in a temporary cookie sent by the browser; if the sharing identification is correct, returning corresponding language information; the browser continues to acquire configuration information corresponding to the current page of the form, and the server detects a sharing identifier in a temporary cookie sent by the browser; and if the sharing identifier is correct, returning the corresponding configuration information and the random code generated according to the sharing identifier. And after the form content corresponding to the address is returned to the browser, if the shared party continues to execute the operation instruction on the form through the browser, the browser sends a random code to the server, the server verifies the random code sent by the browser, and if the random code is correct, the execution result of the operation instruction is returned.
When sharing the form, the sharing party may share the complete form with the shared party, and may also set the permission, and share part of the content of the form with the shared party, for example, a certain record of the form, and when specifically implementing, the sharing party may set the permission of the designated shared party with the server in advance. In addition, the type of the address is not limited, and the address can be implemented in various forms, the shared party obtaining the address and accessing with the address are two completely independent processes, after the address is generated, anyone who obtains the address can access the address, and the time difference between the two processes can be large, for example, the shared party 1 obtains the address shared by the sharing party today, and the shared party 2 is transferred to the shared party 2 the next day, so that the shared party 2 can still access the address the next day. The logical processes that are mainly implemented when accessing forms may be as follows: when the server generates an address, a sharing identifier is generated and attached to the address, content such as identity information, form information, expiration time and the like of a sharing party corresponding to the sharing identifier and the address is stored in the server, the form information can be language information of a form and various configuration information of the form, and generally, the information needs to be sent to a browser, and the shared party can normally access the form on the browser. And after the sharing identifier is set to be over, the shared party cannot access the form through the address with the sharing identifier. The server can also store the identity information of the shared party, namely when the sharing identifier is generated, the shared party corresponding to the sharing identifier is agreed with the sharing party, after the address of the shared party is received, whether the identity information of the shared party sending the address meets the pre-agreed condition or not is judged, and if the identity information meets the pre-agreed condition, the form is returned to the corresponding shared party. The shared party does not really log in the form access mode, the form can be accessed anonymously, when the shared party accesses the form for a plurality of times, various information does not need to be input, convenience can be brought to the shared party, and only specified contents can be checked. This way can also ensure that the identity information of the current sharer cannot be revealed. In addition, the shared form can be set to be only viewed, so that the shared party is ensured not to modify the sharing record with the identity of the sharer, and the shared party cannot access other contents of the form without the right. After the form is shared, if a risk problem occurs, a sharing party sharing the form may need to be found, so the server may further store information of the sharing party sending the sharing request, and if a problem occurs in the access process of the subsequent form, the sharing party sharing the form may find the reason of the problem.
According to the method for accessing the form, the shared party obtains the form through the access address, and the server responds to the access request of the shared party and obtains the sharing identification carried by the address; if the sharing identifier is successfully acquired, acquiring corresponding form content according to the sharing identifier and the address, and returning the form content to the shared party, wherein the shared party can check the form content; and if the address does not carry the corresponding sharing identifier, not returning the form content. Therefore, the shared party can view the form content only by accessing the address with the correct sharing identifier, and the form content can be prevented from being leaked, so that a hacker simulates the form content to cause the shared party to obtain wrong form content, and further more serious results are caused. Therefore, the method provided by the application can improve the safety when the form is accessed, and is particularly suitable for the service scene of accessing the form in an anonymous mode.
In the above embodiment, it is described that the server responds to the shared party access address to return to the form, but how the address is generated is not limited, an embodiment of the present application provides a process for generating an address, specifically: the method comprises the steps that a server receives a sharing request aiming at a form sent by a sharing party; generating a sharing identifier corresponding to the form according to the sharing request; and returning the address which corresponds to the form and is provided with the sharing identifier to the sharing party so that the sharing party can send the address to the shared party. Fig. 3 is a flowchart of a method for sharing an address by a sharing party according to an embodiment of the present disclosure, and as shown in fig. 3, the method includes the following steps: s30: and sending a sharing request. S31: the return strap shares the address of the identity. S32: the address is sent. The sharing party generally sends a sharing request corresponding to the form to the server through the browser, the server generates a sharing identifier corresponding to the form according to the sharing request, an address corresponding to the form and provided with the sharing identifier is returned to the sharing party through the browser, the sharing party sends the address to the shared party, and the shared party can access the corresponding form through the address. According to the method provided by the embodiment of the application, the sharing party sends the sharing request to the server so as to obtain the address of the corresponding form, and through the mode, the server can update the sharing identification and the address at any time, so that lawless persons can be prevented from accessing the form through the previously generated address, and in addition, when the content of the form is changed, the server can also generate a new address according to the changed content of the form.
In some cases, the server can store the authority owned by the sharing party, and the sharing party can only view the form content within the authority range of the sharing party. Therefore, when the shared party views the form through the address sent by the sharing party, only the form content in the authority of the sharing party can be viewed, wherein the authority of the sharing party is the first authority, and the step of generating the sharing identifier corresponding to the form by the server according to the sharing request includes: and generating a sharing identifier corresponding to the first authority of the sharing party according to the sharing party sending the sharing request. The step of returning the form content by the server comprises the following steps: and returning the form content in the first authority corresponding to the sharing identifier carried by the address, wherein the method provided by the embodiment of the application ensures that the shared party can only view the form content in the first authority by setting the first authority of the sharing party, and can ensure the confidentiality of other contents in the form.
Since there may be a plurality of shared parties accessing the same address, in order to distinguish different shared parties, the server returns the form content to the shared party and also returns the random code corresponding to the shared party to the browser, that is, the server returns the form content includes: generating a random code corresponding to the shared party; and returning the form content carrying the random code. After the server returns the form content, the method further comprises the following steps: if the shared party continues to execute the operation instruction on the form, verifying the random code sent by the shared party, wherein the random code is sent to the server when the shared party executes the operation instruction; and if the random code is correct, returning the execution result of the operation instruction. If the operation instruction is specifically to view the sub-form of the current form; before returning the execution result of the operation instruction, the method further comprises: the sub-sheet is set to a read-only state. By the method, different shared parties accessing the same address can be distinguished, so that access behaviors of the different shared parties can be monitored, and form safety is improved. If one form is composed of a plurality of sub-forms, the shared party can operate on the current page of the browser, an operation instruction for accessing the sub-forms is sent to the server through the browser, and the server sets the sub-forms to be in a read-only state, so that the shared party can be ensured not to modify the content of the sub-forms with the identity of the sharer.
In practical applications, the address with the sharing identifier may be leaked, and in order to prevent the important information from being stolen, after the sharing identifier carried by the address is obtained, the method further includes: any one of the following processes is performed: acquiring a time stamp of the sharing identifier, detecting the number of shared parties with the sharing identifier and detecting the number of use times of the sharing identifier; if the sharing identification meets the preset condition, removing the corresponding relation between the current sharing identification and the form; the preset condition includes at least one of: the timestamp represents that the sharing identification exceeds a first preset time from generation to current, the number exceeds a preset number, and the use times exceeds a preset number. After the form content is returned, the method further comprises the following steps: and if the form content currently accessed by the shared party is not the form content corresponding to the sharing identifier, removing the corresponding relation between the current sharing identifier and the form. If the timestamp represents that the sharing identifier exceeds the first preset time from generation to present, the corresponding relation between the current sharing identifier and the form is removed, so that the safety can be improved, and the form can be prevented from being revealed. The length of the first preset time is not limited, and the first preset times corresponding to different forms may also be different, for example, the first preset time of a form with high confidentiality may be set to be shorter, so as to prevent confidential information from leaking. If the number of the shared parties with the sharing identifier exceeds the preset number or the number of the shared identifiers exceeds the preset number, the address with the sharing identifier may be revealed, the server removes the corresponding relationship between the current sharing identifier and the form, and a lawbreaker cannot access the form through the address any more. The preset number and the preset number are not limited, and may be set according to an actual situation, or may be set according to an instruction of the sharing party, for example, the sharing party wants to share the form to a plurality of shared parties, or the sharing party allows a designated shared party to access the address for multiple times, so that the corresponding preset number and the preset number may be increased.
In practical applications, the sharing party may want the shared party to view only the specified content, and perform security processing on part of the information, so after obtaining the sharing identifier carried by the address, the method further includes: acquiring a second authority of the shared party, wherein the second authority is preset in the server by the sharing party; returning the form content includes: and returning the form content corresponding to the second authority. The sharing party appoints the authority corresponding to the shared party to the server in advance; after receiving the access request of the shared party, the server acquires the information of the shared party to find the corresponding second authority, and returns part of the form content corresponding to the second authority in the form to the shared party. The shared party can only view the form content corresponding to the own authority, and the safety in accessing the form can be improved.
Fig. 4 is a flowchart of a method applied to an access form of a shared party according to an embodiment of the present application, and as shown in fig. 4, the method includes the following steps:
s40: the address is accessed, so that the server responds to the access of the shared party to obtain the sharing identification carried by the address, and after the sharing identification is successfully obtained, the corresponding form content is obtained according to the sharing identification and the address;
s41: and receiving the form content returned by the server.
Since the embodiment of the method portion applied to the access form of the shared party corresponds to the embodiment of the method portion applied to the access form of the server, please refer to the description of the embodiment of the method portion applied to the access form of the server for the embodiment of the method portion applied to the access form of the shared party, and details are not repeated here.
The method for accessing the form applied to the shared party provided by the embodiment corresponds to the method for accessing the form applied to the server, and therefore, the method has the same beneficial effects as the method for accessing the form applied to the server.
In the above embodiments, the method for accessing a form is described in detail, and the application also provides corresponding embodiments of an apparatus for accessing a form and a computer device. It should be noted that the present application describes embodiments of the apparatus part and the computer device part from two perspectives, one from the perspective of the function module and the other from the perspective of the hardware.
Based on the angle of the functional module, this embodiment provides an apparatus for accessing a form, which is applied to a server, and fig. 5 is a structural diagram of the apparatus for accessing a form, which is applied to a server and provided by this embodiment of the present application, as shown in the figure, the apparatus includes:
the first obtaining module 10 is configured to respond to the access address of the shared party, and obtain the sharing identifier carried by the address.
And the second obtaining module 11 is configured to, if the sharing identifier is successfully obtained, obtain the corresponding form content according to the sharing identifier and the address.
And a returning module 12 for returning the form content.
Since the embodiments of the apparatus portion and the method portion correspond to each other, please refer to the description of the embodiments of the method portion for the embodiments of the apparatus portion, which is not repeated here.
The apparatus for accessing a form provided in this embodiment corresponds to the above method, and therefore has the same advantages as the above method.
Based on the angle of the functional module, this embodiment further provides a device for accessing a form, which is applied to a shared party, and fig. 6 is a structural diagram of the device for accessing a form, which is applied to a shared party and provided by this embodiment, as shown in the figure, the device includes:
the access module 13 is configured to access the address, so that the server responds to the access of the shared party to obtain the sharing identifier carried by the address, and after the sharing identifier is successfully obtained, obtains the corresponding form content according to the sharing identifier and the address.
And the receiving module 14 is used for receiving the form content returned by the server.
Since the embodiment of the apparatus portion and the embodiment of the method portion correspond to each other, please refer to the description of the embodiment of the method portion for the embodiment of the apparatus portion, and details are not repeated here.
The device for accessing the form provided by the embodiment corresponds to the method, so that the device has the same beneficial effects as the method.
Based on hardware, this embodiment provides a computer device, and fig. 7 is a structural diagram of a computer device according to another embodiment of the present application, as shown in fig. 7, the computer device includes: a memory 20 for storing a computer program;
a processor 21 for implementing the steps of the method of accessing a form as mentioned in the above embodiments when executing the computer program.
The computer device provided by the embodiment may include, but is not limited to, a tablet computer, a notebook computer, a desktop computer, or the like.
The processor 21 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The Processor 21 may be implemented in hardware using at least one of a Digital Signal Processor (DSP), a Field-Programmable Gate Array (FPGA), and a Programmable Logic Array (PLA). The processor 21 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 21 may be integrated with a Graphics Processing Unit (GPU) which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 21 may further include an Artificial Intelligence (AI) processor for processing computational operations related to machine learning.
The memory 20 may include one or more computer-readable storage media, which may be non-transitory. Memory 20 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In this embodiment, the memory 20 is at least used for storing a computer program 201, wherein after being loaded and executed by the processor 21, the computer program can implement the relevant steps of the method for accessing a form disclosed in any one of the foregoing embodiments. In addition, the resources stored in the memory 20 may also include an operating system 202, data 203, and the like, and the storage manner may be a transient storage manner or a permanent storage manner. Operating system 202 may include, among others, Windows, Unix, Linux, and the like. Data 203 may include, but is not limited to, data related to methods of accessing forms, and the like.
In some embodiments, the computer device may also include a display screen 22, an input/output interface 23, a communication interface 24, a power supply 25, and a communication bus 26.
Those skilled in the art will appreciate that the configurations illustrated in the figures are not meant to be limiting of computer devices and may include more or fewer components than those illustrated.
The computer device provided by the embodiment of the application comprises a memory and a processor, and when the processor executes a program stored in the memory, the following method can be realized: a method of accessing a form.
The computer device provided by the embodiment corresponds to the method, so that the computer device has the same beneficial effects as the method.
Finally, the application also provides a corresponding embodiment of the computer readable storage medium. The computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps as set forth in the above-mentioned method embodiments.
It is to be understood that if the method in the above embodiments is implemented in the form of software functional units and sold or used as a stand-alone product, it can be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially or partially implemented in the form of a software product, which is stored in a storage medium and performs all or part of the steps of the methods described in the embodiments of the present application, or all or part of the technical solution. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The computer-readable storage medium provided by the embodiment corresponds to the method, and therefore has the same beneficial effects as the method.
To solve the above technical problem, the present application further provides a computer program product, and a computer program product, where the computer program product includes a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the method for monitoring page collapse according to any one of the above.
The computer program product provided by the embodiment corresponds to the method, and therefore, the computer program product has the same beneficial effects as the method.
The above provides a detailed description of a method, an apparatus, a computer device, and a medium for accessing a form provided by the present application. The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the same element.

Claims (13)

1. A method for accessing a form, applied to a server, includes:
responding to an access address of a shared party, and acquiring a sharing identifier carried by the address;
if the sharing identification is successfully acquired, acquiring corresponding form content according to the sharing identification and the address;
and returning the form content.
2. The method for accessing a form according to claim 1, wherein the generating process of the address specifically is:
receiving a sharing request aiming at the form sent by a sharing party;
generating the sharing identification corresponding to the form according to the sharing request;
and returning the address which corresponds to the form and is provided with the sharing identifier to the sharing party so that the sharing party can send the address to the shared party.
3. The method according to claim 1 or 2, wherein the generating the sharing identifier corresponding to the form according to the sharing request comprises:
generating the sharing identification corresponding to the first authority of the sharing party according to the sharing party sending the sharing request;
the returning the form content comprises:
and returning the form content in the first permission corresponding to the sharing identification carried by the address.
4. The method of accessing forms of claim 3, after returning the form contents, further comprising:
if the shared party continues to execute the operation instruction on the form, verifying a random code sent by the shared party, wherein the random code is sent to the server when the shared party executes the operation instruction;
and if the random code is correct, returning the execution result of the operation instruction.
5. The method of accessing forms of claim 4, wherein the returning the form content comprises:
generating the random code corresponding to the shared party;
and returning the form content carrying the random code.
6. The method for accessing a form according to claim 4, wherein the operation instruction is specifically to view a sub-form of the form currently;
before returning the execution result of the operation instruction, the method further includes:
and setting the sub-form to be in a read-only state.
7. The method according to claim 1, further comprising, after obtaining the sharing identifier carried by the address:
any one of the following processes is performed:
acquiring a timestamp of the sharing identifier;
detecting the number of the shared parties with the sharing identification;
detecting the number of times of use of the sharing identification;
the method further comprises the following steps:
if the sharing identification meets a preset condition, removing the corresponding relation between the current sharing identification and the form;
the preset condition comprises at least one of the following conditions:
the timestamp represents that the sharing identifier exceeds a first preset time from generation to current;
the number exceeds a preset number;
the number of uses exceeds a preset number.
8. The method of accessing forms of claim 7, after returning the form contents, further comprising:
and if the form content currently accessed by the shared party is not the form content corresponding to the sharing identifier, removing the corresponding relation between the current sharing identifier and the form.
9. The method according to claim 1, wherein after obtaining the shared identifier carried by the address, the method further comprises:
acquiring a second permission of the shared party, wherein the second permission is preset in a server by the sharing party;
the returning the form content comprises:
and returning the form content corresponding to the second authority.
10. A method for accessing a form, applied to a shared party, comprises:
the address is accessed, so that the server responds to the access of the shared party to obtain the sharing identification carried by the address, and after the sharing identification is successfully obtained, the corresponding form content is obtained according to the sharing identification and the address;
and receiving the form content returned by the server.
11. An apparatus for accessing a form, applied to a server, comprising:
the first acquisition module is used for responding to an access address of a shared party and acquiring a sharing identifier carried by the address;
the second obtaining module is used for obtaining corresponding form content according to the sharing identifier and the address if the sharing identifier is successfully obtained;
and the return module is used for returning the form content.
12. A computer device comprising a memory for storing a computer program;
a processor for implementing the steps of the method of accessing forms of any of claims 1 to 10 when executing the computer program.
13. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method of accessing forms of any one of claims 1 to 10.
CN202210302410.6A 2022-03-25 2022-03-25 Method, device, computer equipment and medium for accessing form Active CN114666140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210302410.6A CN114666140B (en) 2022-03-25 2022-03-25 Method, device, computer equipment and medium for accessing form

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210302410.6A CN114666140B (en) 2022-03-25 2022-03-25 Method, device, computer equipment and medium for accessing form

Publications (2)

Publication Number Publication Date
CN114666140A true CN114666140A (en) 2022-06-24
CN114666140B CN114666140B (en) 2024-03-19

Family

ID=82032062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210302410.6A Active CN114666140B (en) 2022-03-25 2022-03-25 Method, device, computer equipment and medium for accessing form

Country Status (1)

Country Link
CN (1) CN114666140B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116305032A (en) * 2023-02-14 2023-06-23 北京海致星图科技有限公司 Method and system for accessing system permission in sharing page application

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050251443A1 (en) * 2004-05-10 2005-11-10 Wesley Chan Automated graphical advertisement size compatibility and link insertion
CN101771532A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, device and system for realizing resource sharing
CN104618217A (en) * 2014-03-24 2015-05-13 腾讯科技(北京)有限公司 Method, terminal, server and system for sharing resource
CN106534277A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and device
CN106534276A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and device, mobile terminal
CN108111511A (en) * 2017-12-20 2018-06-01 杭州云屏科技有限公司 One kind shares file access method, device, equipment and storage medium
CN110083783A (en) * 2019-03-22 2019-08-02 深圳壹账通智能科技有限公司 A kind of method, apparatus, storage medium and computer equipment for sharing link
CN110460581A (en) * 2019-07-12 2019-11-15 捷德(中国)信息科技有限公司 Sharing files method, equipment, SE device, is shared end and medium at system
CN112328564A (en) * 2020-09-25 2021-02-05 北京淇瑀信息科技有限公司 Special resource sharing method and device and electronic equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050251443A1 (en) * 2004-05-10 2005-11-10 Wesley Chan Automated graphical advertisement size compatibility and link insertion
CN101771532A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, device and system for realizing resource sharing
CN104618217A (en) * 2014-03-24 2015-05-13 腾讯科技(北京)有限公司 Method, terminal, server and system for sharing resource
CN106534277A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and device
CN106534276A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and device, mobile terminal
WO2018076841A1 (en) * 2016-10-25 2018-05-03 广东欧珀移动通信有限公司 Data sharing method, apparatus, storage medium and server
CN108111511A (en) * 2017-12-20 2018-06-01 杭州云屏科技有限公司 One kind shares file access method, device, equipment and storage medium
CN110083783A (en) * 2019-03-22 2019-08-02 深圳壹账通智能科技有限公司 A kind of method, apparatus, storage medium and computer equipment for sharing link
CN110460581A (en) * 2019-07-12 2019-11-15 捷德(中国)信息科技有限公司 Sharing files method, equipment, SE device, is shared end and medium at system
CN112328564A (en) * 2020-09-25 2021-02-05 北京淇瑀信息科技有限公司 Special resource sharing method and device and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KAN YANG; ZHEN LIU; XIAOHUA JIA; XUEMIN SHERMAN SHEN: "Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach", 《IEEE》 *
尹子轩, 王影, 刘建宾: "智学分享资源有效性检测工具设计与实现", 《中国优秀硕士学位论文全文数据库》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116305032A (en) * 2023-02-14 2023-06-23 北京海致星图科技有限公司 Method and system for accessing system permission in sharing page application
CN116305032B (en) * 2023-02-14 2023-11-14 北京海致星图科技有限公司 Method and system for accessing system permission in sharing page application

Also Published As

Publication number Publication date
CN114666140B (en) 2024-03-19

Similar Documents

Publication Publication Date Title
EP3484125B1 (en) Method and device for scheduling interface of hybrid cloud
CN109743315B (en) Behavior identification method, behavior identification device, behavior identification equipment and readable storage medium for website
Viega Cloud computing and the common man
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN111414407A (en) Data query method and device of database, computer equipment and storage medium
CN110007936B (en) Data processing method and device
US10027692B2 (en) Modifying evasive code using correlation analysis
CN114666140B (en) Method, device, computer equipment and medium for accessing form
CN108234551B (en) Data processing method and device
CN114861201A (en) Data desensitization method, data desensitization server and data desensitization system
CN107679831B (en) Method and related device for calling ERP function
CN110647736A (en) Plug-in agent system login method and device, computer equipment and storage medium
CN111090616B (en) File management method, corresponding device, equipment and storage medium
CN113010897A (en) Cloud computing security management method and system
CN115442164B (en) Multi-user log encryption and decryption method, device, equipment and storage medium
CN111314355A (en) Authentication method, device, equipment and medium of VPN (virtual private network) server
CN115291973A (en) Method and device for connecting database by application on cloud, electronic equipment and storage medium
CN114978934A (en) Information desensitization method and apparatus, electronic device, and computer-readable storage medium
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
CN114764493A (en) Method and device for accessing spatial data, storage medium and electronic equipment
CN114205367A (en) Data synchronization method, device and medium for upper-level platform and lower-level platform
CN113569289A (en) Data desensitization method and device
CN113190812A (en) Login method, system, electronic equipment and storage medium
CN112637160A (en) Login verification method, device, equipment and storage medium
CN114978691B (en) Camouflage method, device and medium for honeypot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant